Get In Touch
Chat with Sales
- Call us
- Customer Support For immediate customer support please call +1-6174444699 or email us at email@example.com
- Email Us Please email Akamai Sales and we will contact you within 1-2 business days.
Proactive protection against zero-day malware
Enterprise Threat Protector proactively identifies, blocks, and mitigates targeted threats such as malware, ransomware, phishing, DNS data exfiltration and advanced zero-day attacks. Enterprise Threat Protector is a Secure Internet Gateway (SIG) that enables security teams to ensure that users and devices can securely connect to the Internet, regardless of wherever they are connecting from, without the complexity associated with legacy security approaches.
Improve Security Posture Everywhere
Your recursive DNS is likely unprotected and could be exploited. Add an additional layer of security in minutes that uses DNS as a security control point to uniformly and immediately block malicious domains and communications for all your users, whether they are on- or off-network.
Direct Internet Access
Secure your branch direct internet access (DIA) traffic quickly with zero complexity and without replicating your security stack at every branch.
Guest Wi-Fi Protection
Enforce an Acceptable Use policy across your guest wi-fi for brand and/or user protection.
Customer Case Study: Perform Group“Working with Akamai, we were able to quickly isolate, contain, and remove threats to our infrastructure, delivering greater integrity with less effort.”
— Daniel Schatz, CISO, Perform Group
Enterprise Threat Protector Features
Real-time Akamai Threat Intelligence
Up-to-the minute threat intelligence with low false positives based on Akamai’s visibility into 15-30% of daily web traffic, 2.2 Trillion Recursive DNS requests, and proprietary Data Science algorithms.
Analysis and Reporting
Real-time insight via an easy-to-use dashboard into all outbound enterprise DNS traffic, as well as threat and acceptable use policy events.
Inline Real-Time Payload Analysis
Three advanced malware detection engines identify and block complex advanced threats and improve zero-day protection.
DNS logs are retained for 30 days and can easily be exported as a .CSV file or integrated into a SIEM for further analysis.
Acceptable Use Policy Management
Customize and enforce your enterprise acceptable use policy and ensure compliance by limiting which content categories can and cannot be accessed.
Quickly understand why Akamai has added a domain or a URL to its threat intelligence lists.
Customer-Categorized Threat Customization
Integrate existing threat intelligence feeds, extending value from your existing security investments.
All DNS requests sent to Enterprise Threat Protector have DNSSEC enabled.
How Does Enterprise Threat Protector Work?
Enterprise Threat Protector uses multiple layers of protection—DNS, URL, and inline payload analysis—to deliver optimal security and reduced complexity, without impacting performance.
By simply directing your external recursive DNS traffic to Enterprise Threat Protector, all requested domains are checked against Akamai’s real-time domain risk scoring threat intelligence.
Safe domains are resolved as normal, malicious domains are blocked, and risky domains are sent to a smart selective proxy where the HTTP or HTTPS URLs are inspected to determine if they are malicious. The HTTP and HTTPS payloads from risky domains are then scanned in real-time using multiple advanced malware-detection engines.
Enterprise Threat Protector Insights
A high-level overview of Enterprise Threat Protector features and benefits.Download Now
Reference Architecture Diagram: Off-Network Device
Learn how Akamai protects devices while off network.View Now
Reference Architecture Diagram: On-Network Device
Learn how Akamai protects devices while on network.View Now
Reference Architecture Diagram: Direct Internet Access (DIA) Connection
Learn how to protect your DIA connection against zero-day threats.View Now
Understand more about how Enterprise Threat Protector works, explore Akamai's Cloud Security Intelligence, and familiarize yourself with the product's cloud-based management portal. Also examine deployment, configuration, and monitoring capabilities.Download Now
See just how quick and simple it is to configure and deploy Enterprise Threat Protector across your entire enterprise in this 5-minute demo video.Watch the Video
Quick Start Guide: Enterprise Protection
The quick start guide provides guidance on how to configure and monitor DNS activity to identify and block threats, such as malware, phishing, DNS data exfiltration, and command and control communication using Enterprise Threat Protector.View Now
Quick Start Guide: Guest WiFi Protection
The quick start guide provides guidance on how to configure, apply, and monitor an Acceptable Use Policy (AUP) for guest Wi-Fi networks using Enterprise Threat Protector.View Now
Enterprise Threat Monitor
This real-time visualization shows the phishing, malware, and command & control threats that Akamai is blocking (for customers) through its Intelligent Platform.Learn More
Ponemon Institute report: Securing the Enterprise Against Cyber Attacks
Ponemon surveyed 600+ IT security practitioners to identify the most significant challenges to securing the enterprise. Learn more about theses barriers as well as the security practices and perceptions of high-performing organizations.View the Report
Fixing the Hole in Your Layered Enterprise Security Strategy
Read this White Paper to learn why integrating a DNS-based solution with layered enterprise and zero trust security strategies is your best defense.Read the White Paper
Why Akamai Uses Enterprise Threat Protector
Watch an interview with Keith Hills, Director of Enterprise IT Risk & Information Security at Akamai.Watch the Video
Secure Internet Gateway
Learn more about how to accelerate your Zero Trust Security Transformation with Enterprise Threat Protector.Read the Blog
How Securing Recursive DNS Proactively Protects Your Network
Recursive DNS doesn’t have to be a security vulnerability. Learn more about the simple and effective control-point this Internet protocol can provide.Read the White Paper
Advanced, Targeted Threats: What do They Mean for Your Bottom Line?
Examine the business impact of malware, ransomware, and phishing, as well as the cost of the average data breach. Given the significant economic impact of these threats, understanding your financial exposure and employing a layered defense simply makes sense.Read the Blog
What Are Domain Generation Algorithms and Why You Should Care?
Learn more about this common evasion and obfuscation technique that is increasingly being used by malicious actors. And understand how DGA effectiveness can be minimized: visibility, evolved algorithms, and ample data are vital.Read the Blog
Perform Group selects Akamai to transform its security posture and gain faster identification, isolation, and resolution of threats.Read the Case Study
Learn more about the significant and quantifiable benefits that Enterprise Threat Protector has delivered since being deployed on Akamai’s corporate network.Read the Case Study
U.S. college protects campus network from malware by utilizing Enterprise Threat Protector.Read the Case Study
Family-friendly entertainment venue utilizes Enterprise Threat Protector to secure free wi-fi from phishing and malware threats and create a new Acceptable Use Policy.Read the Case Study
Financial Services Vertical
Leading financial services firm chooses Enterprise Threat Protector for an additional layer of security framework.Read the Case Study
Europe-based manufacturing company improves their security posture by utilizing Enterprise Threat Protector to check all external recursive DNS traffic and requested domains.Read the Case Study
India-based retailer centralized network security by utilizing Enterprise Threat Protector.Read the Case Study
Large international retailer selects Enterprise Threat Protector to secure free wi-fi and create a new Acceptable Use Policy.Read the Case Study